Bank PO Computer Knowledge test 1

2.A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damage is a

analysthackerinstant messengerprogrammerspammer

3.A device that connects to a network without the use of cables is said to be

distributedcentralizedfreeopen sourceNone of these

4.Reusable optical storage will typically have the acronym

CDDVDROMRWROS

5.The most common type of storage devices are

persistentopticalmagneticflashsteel

6.Codes consisting of lines of varying widths or lengths that are computer-readable are known as

an ASCII codea magnetic tapea bar codean OCR scanneNone of these

7.A Web site's main page is called its

HomepageBrowser pageSearch PageBookmarkNone of these

8.Part number, part description, and number of parts ordered are examples of

controloutputprocessingfeedbackinput

9.To access properties of an object, the mouse technique to use is

draggingdroppingright-clickingleft-clickingshift-clicking

10.Computers use the number system to store data and perform calculations.

binaryoctaldecimalhexadecimalNone of these

11.__________ are attempts by individuals to obtain confidential information from you by falsifying their identity.

Phishing tripsComputer virusesSpyware scams VirusesPhilshing scams

12.Why is it unethical to share copyrighted files with your friends ?

It is not unethical, because it is legal.It is unethical because files are being given for free.Sharing copyrighted files without permission breaks copyright laws.It is not unethical because the files are being given for free.It is not unethical - anyone can access a computer

13.Which of the following can be used to select the entire document ?

CTRL + A ALT + FSHIFT + BCTRL + KCTRL + H

14.To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to AutoFit Contents.

Fit to FormFormatAutosizeContentsAutofit

15.The simultaneous processing of two or more programs by multiple processors is